4.7 Article

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 15, Issue 1, Pages 241-253

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2019.2937486

Keywords

Cloud computing; modular inversion; unimodular matrix transformation; efficiency; privacy

Funding

  1. National Natural Science Foundation of China [61702294, 61572267]
  2. Natural Science Foundation of Shandong Province [ZR2016FQ02]
  3. National Development Foundation of Cryptography [MMJJ20170126, MMJJ20170118]
  4. State Key Laboratory of Information Security in Institute of Information Engineering, Chinese Academy of Sciences [2016-MS-23, 2019-MS-03]
  5. Key Research and Development Project of Shandong Province
  6. Applied Basic Research Project of Qingdao City [17-1-1-10-jch]

Ask authors/readers for more resources

This paper proposes a novel technique using unimodular matrix transformation to achieve secure outsourcing of modular inversion. The technique supports arbitrary and variable modulus, is based on a single untrusted program model, requires only one round interaction, and enables verification of result correctness. Theoretical analysis and experimental results demonstrate the computational savings achieved by the proposed algorithm on local clients.
In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular inversion involves a great amount of operations on large numbers in practice. To address the above problem, this paper proposes a novel unimodular matrix transformation technique to realize secure outsourcing of modular inversion. This technique makes our algorithm achieve several amazing properties. First, to the best of our knowledge, it is the first secure outsourcing computation algorithm that supports arbitrary and variable modulus, which eliminates the restriction in previous work that the protected modulus has to be a fixed composite number. Second, our algorithm is based on the single untrusted program model, which avoids the non-collusion assumption between multiple servers. Third, for each given instance of modular inversion, it only needs one round interaction between the client and the cloud server, and enables the client to verify the correctness of the results retuned from the cloud server with the (optimal) probability 1. Furthermore, we propose an extended secure outsourcing algorithm that can solve modular inversion in multi-variable case. Theoretical analysis and experimental results show that our proposed algorithms achieve remarkable local-clients computational savings. At last, as two important and helpful applications of our algorithms, the outsourced implementations of the key generation of RSA algorithm and the Chinese Reminder Theorem are given.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available